نتایج جستجو برای: cyber crimes
تعداد نتایج: 23947 فیلتر نتایج به سال:
Information Systems and Network Communications has become part of our everyday life. In recent times, there has been a massive growth in computer and electronic devices as well as network-based systems either for e-commerce, e-government or internal processes within organizations. Human beings can no longer be separated from electronic devices and the internet technology. The need for informati...
Spam related cyber crimes have become a serious threat to society. Current spam research mainly aims to detect spam more effectively. We believe the identification and disruption of the supporting infrastructure used by spammers is a more effective way of stopping spam than filtering. The termination of spam hosts will greatly reduce the profit a spammer can generate and thwart his ability to s...
Computer hackers or their malware surrogates constantly look for software vulnerabilities in the cyberspace to perform various online crimes, such as identity theft, cyber espionage, and denial of service attacks. It is thus crucial to assess accurately the likelihood that a software can be exploited before it is put into practical use. In this work, we propose a cognitive framework that uses B...
Computer hackers or their malware surrogates constantly look for software vulnerabilities in the cyberspace to perform various online crimes, such as identity theft, cyber espionage, and denial of service attacks. It is thus crucial to assess accurately the likelihood that a software can be exploited before it is put into practical use. In this work, we propose a cognitive framework that uses B...
Owing to the increasing pace of occurrence of crimes in digital world, cyber forensic investigation is becoming a burning topic in the field of information security. Registry is an important location in Windows system that contains footprints of user activities and other configuration data, which may be valuable for forensic investigators in collecting potential evidences from the system. This ...
The Insider Threat Study, conducted by the U.S. Secret Service and Carnegie Mellon University’s Software Engineering Institute CERT Program, analyzed insider cyber crimes across U.S. critical infrastructure sectors. The study indicates that management decisions related to organizational and employee performance sometimes yield unintended consequences magnifying risk of insider attack. Lack of t...
The advent of the information age has brought great convenience to people's life, at the same time all kinds of cyber-crimes have become increasingly rampant, causing great damage to people's life. To build a network forensics data which is based on multi Agent system model, which is further based on multi Agent technology, by means of an agent, in a distributed implementation method of network...
This fascinating and highly topical subject has a history dating back to the secret world of 1970s Cold War espionage, when the US military and Central intelligence agencies, aided by the latest mainframe systems, were the first to use computer forensics techniques in counterintelligence. In the decades since, cybercrime has emerged from the obscurity of low-level prosecution evidence to become...
In these days, cyber-crimes are increased drastically it resembles the diminishing of security in sensitive information, to improve the security, cryptography is requires and it plays a vital role. Thus authentication is of at most significance as number of hackers who seek to fraud into authorized users account to obtain sensitive information is increasing; in existing system the identity base...
A study conducted by the CERT Program at Carnegie Mellon University’s Software Engineering Institute analyzed hundreds of insider cyber crimes across U.S. critical infrastructure sectors. Follow-up work involved detailed group modeling and analysis of 35 cases of insider theft of intellectual property. In the context of this paper, insider theft of intellectual property for business advantage i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید